Operations Management

€49.00

Purchase

The Security Logging Policy was developed by the Company in order to allow the secure and effective use of the Information Technology Asset like computer, systems or data.

€79.00

Purchase

This System Operations Standard is aimed at IT Operations processes rather than normal end user activities and addresses IT requirements which must be incorporated into system deployment, system support, system…

€49.00

Purchase

The Systems Management Policy outlines the security requirements for the management of Company’s IT networks, Information Systems and the integrity of related business processes. All IT networks and Information Systems…

€79.00

Purchase

The objective of the Technical Vulnerability Management and Control of Malware Standard is to set the minimum requirements for Technical Vulnerability Management and for Control of Malware.

€49.00

Purchase

The objective of the Use of Network Services Policy is to establish management direction, procedural requirements, and technical guidance to ensure the appropriate protection of Company’s information handled by computer…

€49.00

Purchase

The objective of the Vulnerability Alerts Procedure is to describe the vulnerability alerts process, which sets a consistent approach for the distribution, evaluation and follow-up of vulnerability alerts regarding Information…

€49.00

Purchase

This standard documents the security requirements for Vulnerability Management within the Company. Vulnerability management must be applied to all Company systems.

€49.00

Purchase

This standard documents the security requirements for Company’s Web Servers. This standard is intended to assist the Company in addressing risks related to web servers. It is also intended to…